User's Manual

A
Appendix
A-24 AP User’s Guide Atheros Communications, Inc.
A-24 March 2003 COMPANY CONFIDENTIAL
Table A-10 summarizes the data fields on the 2.4 GHz Security Configuration
window.
Table A-10. 2.4 GHz Security Field Descriptions
Security Configuration Field Description
Security Mode Use the radio buttons to specify the security mode.
Security Server Click Edit Security Server Settings to change the
configuration of the security server.
Key Entry Method Use the radio buttons to specify the key entry method
as either hexadecimal or ASCII.
Default Shared Key Use the radio button to specify which encryption key to
use as the default shared key.
Encryption Key Specifies the encryption key used for broadcast/
multicast frames.
Key Length Specifies the key length:
None
10 Hex digits or 5 ASCII text
26 Hex digits or 13 ASCII text
32 Hex digits or 16 ASCII text
Access Control List Specifies the state of the Access Control List (ACL). Use
the drop-down menu to specify the state of ACL,
where:
Disable—Unrestricted Access: By default, while
checking of the ACL is enabled, the access control
list itself is empty. This is the same as disabling the
checking on the ACL.
Enable—Restricted Access: An ACL entry must
exist before ACL can be enabled. While ACL is
enabled, stations with valid shared keys and
stations with matching “allow” entries on the ACL
are authenticated.
Strict—Restricted (w/ACL match): Requires an
ACL entry that specifies the station's assigned
unique key or the station is denied association. In
the strict mode, stations with valid share keys and
not on the ACL are not authenticated. The stations
must have unique keys defined and matching
“allow” ACL entries specified, in order to associate
with the AP.
Edit ACL Settings Click here to edit the configuration of the ACL
operation for 2.4 GHz (refer to “2.4 GHz Access Control
List Configuration Window” on page A-27).